# sh /opt/jboss/keycloak/bin/kcadm.sh config credentials --server http://localhost:8080/auth --realm master --user admin --password k3ycl0ak # #./kcadm.sh get clients/5e7c2693-2a14-4166-8488-5258c8491688 -r master # sh /opt/jboss/keycloak/bin/kcadm.sh create clients -r poc -s clientId=moodle \ # -s enabled=true \ # -s clientAuthenticatorType=client-secret \ # -s secret=d0b8122f-8dfb-46b7-b68a-f5cc4e25d000 \ # -s rootUrl="https://moodle.mydomain.duckdns.org" \ # -s adminUrl="https://moodle.mydomain.duckdns.org" \ # -s 'redirectUris=["https://moodle.mydomain.duckdns.org/*"]' \ # -s 'webOrigins=["https://moodle.mydomain.duckdns.org"]' # #### https://github.com/adorsys/keycloak-config-cli # #### https://medium.com/@jkroepke/handle-keycloak-config-as-code-d9265cdc03ad # ## SAML2 Integration # #curl https://moodle.isardvdi.site/auth/saml2/sp/metadata.php # # Import as client provider # get-roles --cclientid test-client --rolename operations docker exec -ti isard-sso-keycloak sh -c " /opt/jboss/keycloak/bin/kcadm.sh config credentials --server http://localhost:8080/auth --realm master --user admin --password keycloakkeycloak \ && /opt/jboss/keycloak/bin/kcadm.sh get clients/bef873f0-2079-4876-8657-067de27d01b7 -r master"""